On 30/06/16 06:34, Peter Bowen wrote:
I think there is confusion over the generic term “Symantec”.  There is no issue 
for Symantec (the company) to be an affiliate of the USG FPKI and to operate 
CAs mutually cross-certified with the USG FPKI.  Additionally there is no issue 
with Symantec (or anyone else) to operate CAs included in the Mozilla trust 
anchor list.

Where there is a problem, as Richard pointed out, is when a CA in the Mozilla 
trust anchor list issues a cross-certificate to a CA mutually cross-certified 
by the USG FPKI.  The Mozilla policy is that every CA that is the subject of a 
cross issued by a CA in the Mozilla trust anchor list must comply with Mozilla 
policy.  This is recursively true as well — “grandchild”, “great-grandchild”, 
etc CAs must comply with Mozilla policy.

Instead of revoking the Symantec SSP to Federal Bridge certificate, Symantec 
could instead revoke these two certificates to separate the USG FPKI from their 
Mozilla trusted CAs:
https://crt.sh/?id=2733031
https://crt.sh/?id=12722020

After a CA has disclosed an intermediate cert as revoked, how long does it take for that revocation to be added to OneCRL and for the majority of Firefox clients to pick up that updated OneCRL?

The cross-certificate issued by Symantec to "Federal Bridge CA 2013" (https://crt.sh/?id=12638543) expires in 1 month. I'm wondering if there's any point in revoking this intermediate or the two other intermediates that Peter mentioned.

This is probably a better option and would avoid the issues you raised before.

Thanks,
Peter

On Jun 29, 2016, at 10:18 PM, Myers, Kenneth (10421) 
<[email protected]> wrote:

Thanks Eric.


1)      Mutual trust is dependent on an exchange of certificates as outlined in 
the MOA and not the receipt. If one is removed, both must be removed per the 
MOA. It is currently being discussed to allow only a certificate receipt 
because mutual trust is a fundamental principle of the Federal Bridge. Revoking 
the certificate breaches the agreement. The IdenTrust CA is operated under a 
different program which coincidentally removed the certificate exchange 
requirement around the same time it was brought up in the forum and in the FPKI 
SSL testing.

2)      The federal bridge is an identity hub and not an anchor. Trust is 
established through the cert chain to Federal Common Policy and not through a 
trust bundle or a trust store. Its purpose is to connect organizational PKIs so 
an affiliate or federal agency can continue to use their root CA as a trust 
anchor without the need to install other roots. By entering into an agreement 
with the Federal Bridge, all affiliates (Symantec included) recognize they 
trust certificates issued by other affiliates of the Federal Bridge based on 
the policy mapping in certificate exchange. All certificates are issued against 
the same criteria as outlined in the Federal Bridge CP and mapped to affiliate 
CPs.

Ken

--
Rob Stradling
Senior Research & Development Scientist
COMODO - Creating Trust Online

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to